Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS7650396 B2
Publication typeGrant
Application numberUS 11/763,937
Publication date19 Jan 2010
Filing date15 Jun 2007
Priority date6 Dec 2000
Fee statusPaid
Also published asUS6978301, US7246162, US7246163, US20020069275, US20060031434, US20060031435, US20070244998, US20090282129, WO2002071691A2, WO2002071691A3
Publication number11763937, 763937, US 7650396 B2, US 7650396B2, US-B2-7650396, US7650396 B2, US7650396B2
InventorsGlen D. Tindal
Original AssigneeIntelliden, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
System and method for defining a policy enabled network
US 7650396 B2
Abstract
A system and method for communicating with network devices without regard to the device type and/or manufacturer is described. In one embodiment, the present invention provides a global graphical user interface (GUI) for communicating with various network devices. The global GUI includes an intuitive interface driven by a template library. For each device type and each device manufacturer, this template library can store both the attribute fields required for device configuration and the format for communicating those attribute fields. When a network administrator wants to communicate with a particular network device, the template associated with that device can be retrieved from the template library. The network administrator can then populate the attribute fields of that template with the appropriate data. This attribute data can be formatted and provided to the network device.
Images(10)
Previous page
Next page
Claims(18)
1. A method for defining a policy enabled network, the method comprising:
creating a network policy which corresponds to a predetermined network configuration state;
creating a business rule which corresponds to a predetermined series of steps required in response to the network policy;
associating the network policy to the business rule such that the network policy, when implemented in the network, adheres to the predetermined series of steps and results in the predetermined network configuration state;
storing the business rule in a data repository;
storing the network policy in the data repository;
storing the predetermined network configuration state in the data repository;
retrieving from a template library, in response to commands being needed to properly configure a particular one of a plurality of network devices in the network to operate in accordance with the predetermined network configuration state, a command-format template for the particular one of the plurality of network devices; and
generating, using the retrieved command-format template, device-specific commands for the particular one of the plurality of network devices.
2. The method of claim 1, further comprising:
applying the device-specific commands to the particular one of the plurality of network devices.
3. The method of claim 1, wherein creating the business rule comprises:
creating a computer programmable object, which reflects a predefined series of steps for implementing the business rule.
4. The method of claim 1, wherein creating the business rule comprises:
creating an XML Document, which reflects a predefined series of steps for implementing the business rule.
5. The method of claim 1, wherein creating the business rule comprises:
creating an XML Schema, which reflects a predefined series of steps for implementing the business rule.
6. The method of claim 2, wherein creating the business rule comprises:
creating a text document, which reflects a predefined series of steps for implementing the business rule.
7. The method of claim 1, wherein creating the network policy comprises:
creating a computer programmable object, which reflects the predefined network configuration state required for correctly implementing the network policy.
8. The method of claim 1, wherein creating the network policy comprises:
creating an XML document, which reflects the predefined network configuration state for correctly implementing the network policy.
9. The method of claim 1, wherein creating the network policy comprises:
creating an XML schema, which reflects the predefined network configuration state for correctly implementing the network policy.
10. The method of claim 1, wherein creating the network policy comprises:
creating a text document which reflects the predefined network configuration state for correctly implementing a network policy.
11. The method of claim 1, wherein associating the business rule to the network policy comprises:
creating a computer programmable object which defines the association of the business rule to network policy.
12. The method of claim 1, wherein associating the business rule to the network policy comprises:
creating an XML document which defines the association of the business rule to the network policy.
13. The method of claim 1, wherein associating the business rule to the network policy comprises:
creating an XML schema which defines options for associating the business rule and the network policy.
14. The method of claim 1, wherein associating the business rule to the network policy comprises:
creating a text document which defines steps for associating the business rule and network policy.
15. A process for implementing a policy enabled network comprising:
receiving a request to implement a desired network policy;
querying a data repository used to store required business rules;
querying a data repository used to store predefined network configurations;
determining a plurality of network devices to which to apply the predefined network configurations to implement the desired network policy; and
applying the predefined network configurations to the plurality of network devices in an order and as defined in the business rules, wherein applying the predefined network configurations further comprises:
retrieving from a template library, in response to commands being needed to properly configure a particular one of the plurality of network devices to operate in accordance with the predetermined network configuration, a command-format template for the particular one of the plurality of network devices; and
generating, using the retrieved command-format template, device-specific commands for the particular one of the plurality of network devices.
16. The process of claim 15 including:
receiving a network notification from a network device when applying the predefined network configurations;
checking the status of a current network policy by consulting a network policy server, retrieving a policy associated with the network notification and, as required, implementing the desired network policy.
17. The process of claim 16 including:
notifying a selected one of a network administrator, a system, and a customer upon completion of implementing the desired network policy.
18. The process of claim 15, wherein the request originates from a selected one of a network administrator, a system, and a customer.
Description
PRIORITY

The present application is a continuation application of commonly owned and assigned application Ser. No. 11/216,482, entitled SYSTEM AND METHOD FOR CONFIGURING A NETWORK DEVICE, filed on Aug. 31, 2005, now Pat. No. 7,246,163, which is incorporated herein by reference; which is a continuation application of application Ser. No. 09/799,579, entitled SYSTEM AND METHOD FOR CONFIGURING A NETWORK DEVICE, filed Mar. 6, 2001, now U.S. Pat. No. 6,978,301; which is a continuation-in-part application of the following commonly owned and assigned patent applications: application Ser. No. 09/730,864, entitled SYSTEM AND METHOD FOR CONFIGURATION, MANAGEMENT AND MONITORING OF NETWORK RESOURCES, filed on Dec. 6, 2000, now U.S. Pat. No. 7,249,170; application Ser. No. 09/730,680, entitled SYSTEM AND METHOD FOR REDIRECTING DATA GENERATED BY NETWORK DEVICES, filed on Dec. 6, 2000; application Ser. No. 09/730,863, entitled EVENT MANAGER FOR NETWORK OPERATING SYSTEM, filed Dec 6, 2000; patent application Ser. No. 09/730,671, entitled DYNAMIC CONFIGURATION OF NETWORK DEVICES TO ENABLE DATA TRANSFERS, filed on Dec. 6, 2000, now U.S. Pat. No. 7,054,946; and patent application Ser. No. 09/730,682, entitled NETWORK OPERATING SYSTEM DATA DIRECTORY, filed on Dec. 6, 2000.

RELATED APPLICATIONS

The following commonly owned and assigned patent applications are hereby incorporated by reference in their entirety:

  • patent application Ser. No. 09/730,864, entitled System and Method for Configuration, Management and Monitoring of Network Resources, filed on Dec. 6, 2000;
  • patent application Ser. No. 09/730,680, entitled System and Method for Redirecting Data Generated by Network Devices, filed on Dec. 6, 2000;
  • patent application Ser. No. 09/730,863, entitled Event Manager for Network Operating System, filed on Dec. 6, 2000;
  • patent application Ser. No. 09/730,671, entitled Dynamic Configuration of Network Devices to Enable Data Transfers, filed on Dec. 6, 2000; and
  • patent application Ser. No. 09/730,682, entitled Network Operating System Data Directory, filed on Dec. 6, 2000.
  • patent application Ser. No. 11/763,934, entitled SYSTEM AND METHOD FOR CONFIGURING A NETWORK DEVICE, filed herewith, which is incorporated herein by reference.
FIELD OF THE INVENTION

The present invention relates generally to network systems. More particularly, but not by way of limitation, the present invention relates to systems and methods for configuring, managing and monitoring network resources such as routers, optical devices and storage devices.

BACKGROUND OF THE INVENTION

With the ever-increasing reliance upon electronic data, businesses are becoming more and more reliant upon those networks responsible for distributing that data. Unfortunately, the rapid growth in the amount of data consumed by businesses has outpaced the development and growth of certain necessary network infrastructure components. One reason that the development and growth of the network infrastructure has lagged behind centers on the present difficulty in expanding, configuring, and reconfiguring existing networks. Even the most routine network expansions and reconfigurations, for example, require significant, highly technical, manual intervention by trained network administrators. Unfortunately, these highly trained network administrators are in extremely short supply. Thus, many needed network expansions and reconfigurations are delayed or even completely avoided because of the inability to find the needed administrators to perform the required laborious, technical tasks.

The present difficulty in configuring and reconfiguring networks is best illustrated by an example directed toward installing a single new router on an existing network. To install a new router (such as router 100 or 105 in FIG. 1), an administrator 110 first would need to choose a particular router with the best attributes for the network. The basic configuration of the new router generally will be defined by its manufacturer and its model. Although it would seem that the router should be chosen based upon its attributes, administrators 110 often choose a router based upon the identity of its manufacturer and the administrators' ability to configure devices from that manufacturer. Administrators 110, for example, may only know how to configure and operate devices manufactured by Cisco Systems, Inc. and may overlook equal or even superior devices from other manufacturers merely because they cannot or have not been trained to configure them.

After the administrator 110 has chosen the desired router (router 105, for example), the administrator 110 generally will order the router 105 from the manufacturer and have it shipped, not necessarily to the installation site, but rather to the administrator's site where a basic configuration can be installed. The administrator 110 then ships the router 105 to the installation site where it can be physically installed. After the router 105 has been physically installed, the administrator 110 typically is manually notified, e.g., by telephone, that the router 105 is connected to the network. The administrator must then create a set of device-specific commands required to fully configure the router 105 and transfer those commands to the router's memory 115. After the administrator 110 verifies that the device-specific commands were installed correctly, the router 105 can be brought online.

Obviously, the steps required for an administrator to configure a single router are quite cumbersome and require significant technical skill. The problem, however, is even more severe when the administrator desires to simultaneously configure or reconfigure several network devices. First, the administrator, for example, would need to manually identify the network devices that need to be configured or reconfigured. For example, if the administrator desired to turn up service between two points, the administrator would need to identify the routers along the path between the two points. The administrator would then need to verify that the policies and rules established for the network permit the contemplated reconfiguration for those devices. Assuming that the reconfiguration is within the network's policies and rules, the administrator would need to create the device-specific code required to reconfigure each of the identified devices. In many instances, the same device-specific code cannot be used on all of the devices. For example, the device-specific commands required to reconfigure a Cisco™ router differ significantly from the device-specific commands required to reconfigure a Juniper™ router. Thus, if the identified network devices include both Cisco™ and Juniper™ routers, the administrator would be required to create different versions of the device-specific commands, thereby significantly increasing the chance for error in the reconfiguration process.

Once the device-specific commands have been created for each of the identified network devices, the commands must be manually transmitted to each device. That is, a connection, e.g., a telnet connection, must be established to each device and the particular commands transferred thereto. After each device has received its commands, the network administrator must manually reconnect to each device and verify that the device received the proper commands and that it is operating properly.

Although some tools have been developed to help administrators perform certain ones of the laborious tasks of network management, these tools are extremely limited in their application. For example, CiscoWorks™ is a group of unrelated tools that can aid administrators in some enterprise level tasks. CiscoWorks™ and similar tools provide singularly focused, unrelated tools to perform activities such as quality of service (QOS) provisioning and network policy management. These tools do not provide a way to interrelate the various happenings in a network. In essence, these present network tools lack a holistic approach to network administration.

Moreover, tools like CiscoWorks™ are generally dedicated to the management of one type of network device, e.g., router or optical device, and one brand of network device. For example, CiscoWorks™ does not help an administrator configure a Juniper™ router, and it does not help an administrator configure optical devices. Thus, if the network has both Cisco™ and Juniper™ devices, multiple unrelated tools must be utilized to perform basic network management tasks. Unfortunately, because these multiple unrelated tools are so difficult to manage, network administrators are prone to select routers based upon manufacturer identity rather than upon device features.

In addition to several other drawbacks, these singularly focused network tools result in substandard fault detection and recovery. For example, in present systems, once a configuration is changed, there is no easy way to “back out” of that configuration if a problem arises. Presently, if a new configuration for a target device fails, the network administrator would be forced to recreate the device-specific commands of the target device's previous configuration, manually connect to the device and then transmit the recreated device-specific commands to the device. As can be appreciated, this process can be extremely time consuming and error prone.

Another drawback to existing network technology centers on the multitude of different interfaces that a network administrator must navigate to configure various network devices. Presently, each network device manufacturer uses its own distinct interface for communicating with its network devices. For example, a network administrator would use a first interface for communicating with a Ciena Corporation (hereinafter “Ciena”) optical device and a second interface for communicating with a Nortel™ optical device. Because, these interfaces may have very little in common, the network administrator would be required to spend a great deal of time learning both interfaces.

The burden on a network administrator increases dramatically when he needs to communicate with different types of devices manufactured by different companies. In many networks, an administrator could be required to communicate with routers, optical devices, and storage devices—all manufactured by different companies. Thus, a network administrator faces the daunting task of learning and using the distinct interfaces created by each of these manufacturers.

To date, each network device manufacture unfortunately has focused on building its own interface and making its own product easier to use. In other words, network device manufactures have focused on developing their own software platforms to operate their own network devices. Device manufactures, as would be expected, have not focused on an integrated software platform that will operate devices of different types and/or from different manufactures. There is no motivation for a company like Nortel™ to aid a network administrator in configuring a device from its competitor, Ciena.

The lack of an integrated software platform for communicating with, operating and/or configuring various network devices has led to the slowed expansion of existing networks. Because network administrators shy away from purchasing network devices that require them to undergo additional training, the lack of such an integrated software platform prevents new device manufactures from entering the market. Moreover, lack of such an integrated software platform prevents new network providers from entering the market because they cannot find trained personnel that can operate the distinct interfaces developed by the various network device manufactures. Accordingly, an integrated network software platform is needed. In particular, a system and method are needed for communicating with network devices without regard to the device type and/or manufacturer.

SUMMARY OF THE INVENTION

In one innovative aspect, a system and method for communicating with network devices without regard to the device type and/or manufacturer is disclosed. In one embodiment, the present invention provides a global graphical user interface (GUI) for communicating with various network devices. Thus, instead of being forced to learn different interfaces for different network devices, a network administrator, using the present invention, can learn a single global GUI and communicate with the various types and brands of network devices.

Although the global GUI can be constructed in a variety of ways, good results have been achieved by using an intuitive interface driven by a template library. For each device type and each device manufacturer, this template library can store both the attribute fields required for device configuration and the format for communicating those attribute fields. For example, one template could be designed for Cisco™ routers, another for Juniper™ routers, and another for EMC™ storage devices. Moreover, different templates could even be designed for different models of, for example, a particular manufacturer's device.

When a network administrator wants to communicate with a particular network device, the template associated with that device can be retrieved from the template library. The network administrator can then populate the attribute fields of that template with the appropriate data. Because the global GUI can automatically format the data received from the network administrator, the network administrator can use the same format for the attribute fields across different network devices. In other words, through the present invention, network administrators will not be forced to learn the syntax for different network devices. Rather, the network administrator only needs to learn the syntax for the global GUI, which can “translate” instructions into the proper form and provide those “translated” instructions to the appropriate network device.

Although the global GUI can be operated independently, good results have been achieved by integrating the global GUI with a directory-enabled network system. For example, the global GUI can be integrated with a network manager unit that is disposed between the network administrator and the various network devices. The network manger unit can include, among other things, a central repository for storing configuration records for each of the attached network devices. In this type of system, the global GUI can be used to configure or reconfigure a configuration record associated with any type or brand of network device. The data in the configuration record can then be used to populate the attribute fields in the template, and the populated fields can be formatted and provided to the appropriate network device. In yet other embodiments, the configuration records and templates can be combined to form a single data structure.

As can be appreciated by those skilled in the art, the present invention addresses significant shortfalls in present network technology. In particular, the present invention, provides a way to configure, manage and view an entire network system. These and other advantages of the present invention are described more fully herein.

BRIEF DESCRIPTION OF THE DRAWINGS

Various objects and advantages and a more complete understanding of the present invention are apparent and more readily appreciated by reference to the following Detailed Description and to the appended claims when taken in conjunction with the accompanying Drawings wherein:

FIG. 1 illustrates a present system for configuring network routers:

FIG. 2 illustrates a system for configuring network devices in accordance with the principles of the present invention;

FIG. 3 illustrates in more detail the network manager unit shown in FIG. 2;

FIG. 4 illustrates in more detail the directory element shown in FIG. 3;

FIG. 5 illustrates a configuration record for a typical network device in accordance with the present invention;

FIG. 6 illustrates in more detail the event bus shown in FIG. 3;

FIG. 7 is a flow chart of a method for configuring a network device in accordance with the present invention;

FIG. 8 illustrates a network system with an integrated global graphical user interface; and

FIG. 9 illustrates a directory tree for managing network device templates.

DETAILED DESCRIPTION

Although the present invention is open to various modifications and alternative constructions, a preferred exemplary embodiment that is shown in the drawings is described herein in detail. It is to be understood, however, that there is no intention to limit the invention to the particular forms disclosed. One skilled in the art can recognize that there are numerous modifications, equivalents, and alternative constructions that fall within the spirit and scope of the invention as expressed in the claims.

Referring now to FIG. 2, there is illustrated a system 120 for configuring network devices 100, 105, 125, 130 (collectively 135) in accordance with the principles of the present invention. This embodiment includes a network manager unit 140 disposed between the administrator 110 and the network devices 135, which can include routers, optical devices, etc. The network manager unit 140 also is connected to remote storage 145 (connected by network 150) and a network manager support 155.

To alter the configuration of a network device 135 or to add a network device to an existing network, the administrator 110 can access the network manager unit 140, search for and retrieve the configuration record corresponding to a target network device, and through a series of interactive, wizard-like screens, change the configuration record for the target network device. This altered configuration record is stored in a central repository in the network manager unit 140 and can be checked against network policies accessible by the network manager unit 140. Next, the network manager unit 140 can generate device-specific commands from the new configuration record and push those device-specific commands to the target network device or have the target network device pull the commands. Finally, the network manager unit 140 can verify that the new configuration was installed correctly at the target network device.

To generate the necessary device-specific commands, the network manager unit 140 may access the remote storage device 145 that can contain the various templates needed to generate device-specific commands for different types, brands, and/or models of network devices. Each of these templates can contain variable fields corresponding to either information stored in the configuration records or information input directly by the administrator. The network manager unit 140 generates the device-specific commands by retrieving the appropriate template and filling in the variable fields with the data from the configuration records and/or data input directly by the administrator 110. Once generated, these device-specific commands can be stored in the configuration record and/or they can be stored in the remote storage device 145 with an appropriate pointer stored in the configuration record.

As can be appreciated by those skilled in the art, the network manager unit 140 can be implemented on virtually any hardware system. Good results, however, have been achieved using components running the Red Hat™ LINUX Operating System and the Sun Solaris™ UNIX Operating System. In embodiments running either of these operating systems, the network manager unit 140 preferably is configured to utilize the common services provided by that particular operating system.

Referring now to FIG. 3, there is illustrated in more detail the network manager unit 140 shown in FIG. 2. This embodiment of the network manager unit 140 includes six basic modules: an interface 160, a directory 165, a policy manager 170, an event bus 175, a health manager 180 and an action manager 185. The illustrated connections between the various components are exemplary only. The components can be connected in a variety of ways without changing the basic operation of the system. Although the division of the network manager unit 140 into the six components is the presently preferred embodiment, the functions of these components could be subdivided, grouped together, deleted and/or supplemented so that more or less components can be utilized in any particular implementation. Thus, the network manager unit 140 can be embodied in several forms other than the one illustrated in FIG. 3.

Referring first to the interface module 160, it is designed to exchange data with the administrator 110 (shown in FIG. 2) and, in some embodiments, with the network devices 135 (also shown in FIG. 2). Although the interface 160 could implement virtually any type of interface, good results have been achieved using a graphical, web interface. Other interfaces can be based upon wireless protocols such as WAP (wireless application protocol).

The second component of the network manager unit 140 is the event bus 175. The event bus 175 includes a central posting location for receiving messages relating to network events. For example, when a configuration for a network device 135 is to be changed, an appropriate message can be published (or otherwise made available) to the event bus 175. Similarly, if a network condition such as an error occurs, an appropriate message can be published to the event bus 175. Notably, any message published to the event bus 175 can also be sent to the administrator 110 by way of the interface 160. The administrator 110, however, does not necessarily need to respond to a received message for the event to be addressed by the network manager unit 140.

To determine the proper response for a message posted to the event bus 175, the received message can be compared against the policies stored in the policy manager 170, which is a repository for the business and network policies and rules used to manage the network. By using these rules and policies, an administrator 110 (shown in FIG. 2) can define a response for any event published to the event bus 175. The defined response can be virtually anything including reconfiguring a network device, shutting down a network device and notifying an administrator.

In operation, the policy manager 170 can read a message posted to the event bus 175. Alternatively, the event bus 175 can automatically push the message to the policy manager 170. Either way, however, the policy manager 170 uses the message to access policy records that can be stored, for example, in a look-up table and to correlate the message to the appropriate response. Once the policy manager 170 has determined the appropriate response, that response is published to the event bus 175 as a work order that can be read by the action manager 185 and subsequently executed. That is, the action manager 185 can read the work order from the event bus 175 and perform the necessary tasks to complete that work order. In other embodiments, the work order can be sent directly to the action manager 185. For example, assume that the action manager 185 reads a work order from the event bus 175 that indicates two routers—one a Cisco™ router and one a Juniper™ router—need to be enabled. The action manager 185 can locate each of these routers and determine the device-specific code needed to enable them. The code required to enable the Cisco™ router, for example, might be “enable_router” and the code required to enable the Juniper™ router might be “router_enable.” Because the action manager 185 determines the appropriate device-specific code, however, the administrator 110 (shown in FIG. 2) only needs to generically indicate that both devices are to be enabled. The administrator 110 does not need to know the actual device-specific code required by each router. This feature is described in greater detail with relation to FIG. 8.

In other embodiments, the action manager 185 can verify that the administrator 110 (shown in FIG. 2) has authority to make changes to network devices without authorization from additional parties. If additional authorization is required, the action manager 185 can post an appropriate message to the event bus 175.

Still referring to FIG. 3, the directory 165 of the network manager unit 140 includes a central repository for storing the configuration records of each of the network devices connected to the network manager unit 140. For example, the directory 165 could store a separate configuration record for each of network devices 100, 105, 125 and 130 shown in FIG. 2. In certain embodiments, several interconnected directories may be utilized, and in such systems, each directory can store a certain subset of the configuration records or a complete copy of all of the configuration records. Generally, such embodiments would employ multiple linked network manager units 140, and in the embodiment where complete copies of the configuration records are stored in different directories, synchronization techniques can be used to guarantee data integrity.

The configuration records stored in the directory 165 are searchable by way of the interface 160. That is, the administrator 110 or a component within the network manager 140 (shown in FIG. 2) can initiate a search through the interface 160 and the results of that search can be made available to the administrator 110 through the interface 160. Moreover, the configuration records can be searched in any of a variety of ways. For example, the configuration records can be searched according to equipment type (e.g., routers, optical devices, etc.), device type (edge router, core router, etc.), device location, device manufacturer, device model, device name, operational status, etc. The directory 165 can be used to enable directory-based networking.

Referring now to the health manager 180, it can be configured to monitor the overall health of the network and/or the health of individual network devices 135 (shown in FIG. 2) within the network. The health manager 180 can operate in an active mode and/or a passive mode. In the active mode, the health manager actively polls at least some of the network devices 135 about their status, utilization, congestion, etc. In the passive mode, the various network devices 135 automatically report to the health manager 180. In either embodiment, however, the health manager 180 can collect individual device information and model overall network health. Additionally, the health manager 180 can publish messages regarding network device problems, projected network device problems, network problems, and/or projected network problems. The policy manager 170 can then determine the appropriate course of action to take for the particular message and the action manager 185 can implement that response.

In further embodiments, the health manager can monitor the health of the network manager components. For example, the health manager can monitor the operation of the event bus, the action manager and/or the directory. Moreover, the health manager can monitor the flow of data between the various components of the network manager.

Referring now to FIG. 4, there is illustrated in more detail the directory 165 shown in FIG. 3. This embodiment of the directory 165 consists of four interconnected modules: configuration storage 187, configuration comparator 190, configuration reader 195 and interface 200. The directory 165, however, does not need all of the modules to function in accordance with the principles of the present invention.

The configuration reader module 195 of the directory 165 is designed to initiate communication with (or directly communicate with) a target network device and retrieve that device's actual configuration. For example, the configuration reader can retrieve the actual configuration from the memory 115 of router 105 (shown in FIG. 2). This retrieved actual configuration can then be passed to the configuration comparator 190. The configuration reader 195 can also retrieve the intended configuration of the target device from the configuration storage 187 and pass that intended configuration to the configuration comparator 190. The configuration comparator 190 can then compare the actual configuration and the intended configuration and present the differences to the administrator 110 (shown in FIG. 2). In one embodiment, the differences in the configurations are not only presented literally, but also in a natural language summary form. Once the differences have been identified, they can be used to identify a failed configuration installation and/or to aid the administrator in creating the proper configuration for a device.

As previously discussed, the configuration storage 187 is designed to store configuration records corresponding to network devices such as network devices 135 shown in FIG. 2. In one embodiment the configuration storage 187 is designed not only to store the present configuration record for a network device, but also to store previous configuration records for that device. By storing these previous configurations, fault recovery and correction are vastly improved over present systems because prior, successful configurations can be quickly retrieved and used to replace new, faulty configurations. For example, a prior configuration of a previously known good state can be retrieved and installed on the associated network device. This prior configuration could be days old or even weeks old. Prior configuration records can be distinguished by version numbers and/or a time stamp. Additionally, each configuration record can include a searchable summary that includes notes on the configuration and why that configuration was modified.

Referring now to FIG. 5, there is illustrated a configuration record 205 for a typical network device. This configuration record 205 is divided into four portions: a common information model (“CIM”) data portion 210, a vendor data portion 215, proprietary data portion 220 and a data pointer 225. The CIM data portion 210 contains data relating to the physical attributes of a particular network device such as name, device type, number of interfaces, capacity, etc. The CIM data items are defined in the CIM Specification v2.2 and the CIM Schema v2.4, both of which are well known in the art and incorporated herein by reference.

The vendor data portion 215 of the configuration record contains standard vendor-specific data regarding the particular network device. For example, the vendor data portion 215 could indicate which version of an operating system that the network device is running or which features of the device are enabled. Generally, the data in the vendor data portion 215 is specific to each manufacturer and even to each model of network device.

The proprietary data portion 220 of the configuration record can contain data used by the network manager unit in configuring and managing the network devices. In one embodiment, for example, the proprietary data portion 220 includes a pointer to an address at which a core dump for a network device is stored. That is, if a router initiates a core dump, the location of that core dump could be recorded in the proprietary data portion 220 of the configuration record for that router. In other embodiments, the proprietary data portion 220 can store version numbers, time stamps, health records for a particular configuration, configuration summary data, configuration notes, etc.

The pointer portion 225 of the configuration record 205 can be used to point to a storage location where the actual device-specific commands for the associated network device are stored. Similarly, the pointer 225 could be configured to point to a storage location for a device-specific template for configuring a newly installed network device. In other embodiments, the pointer portion 225 of the configuration record can be supplemented or replaced with a storage location for actual device-specific code.

Referring now to FIG. 6, there is illustrated in more detail the event bus 175 shown in FIG. 3. As previously described, the event bus 175 is a posting location for messages relating to network events. Network devices as well as the other components of the network manager unit 140 (shown in FIG. 2) can address and post events to the event bus 175.

The particular embodiment of the event bus 175 shown in FIG. 6 is comprised of four basic modules: an interface 230, a status storage 235, an event queue 240, and an event queue manager 245. In operation, a message indicating the occurrence of a network event is posted to the event queue 240 by way of the interface 230. The messages stored at the event queue 240 are then made available to the policy manager 170 (shown in FIG. 3), so that a proper response can be determined. If the posted message is a work order from the policy manager 170, the work order is made available to the action manager 185 (shown in FIG. 3) for subsequent implementation.

In one embodiment of the event bus 175, an event message is stored in status storage 235 along with a status field and an age field. Thus, for any message posted to the event bus 175, its status and age can be continuously monitored. (The event bus can also get messages from client devices.) For example, status storage 235 could indicate that the status for a particular event is pending in the action manager 185 (shown in FIG. 3), awaiting proper authorization completed, stalled, etc. As the status changes from one status to another, appropriate messages can be generated and posted at the event queue 240. For example, if the status of an event changes from pending to stalled, an appropriate message can be posted to the event queue 240 so that the policy manager 170 can determine how to respond. Similarly, if the age field in the status storage 235 indicates that a particular network event has not been addressed within a predetermined amount of time, that event can be requeued, deleted from the event queue 240, or a new event notification indicating the delay can be generated and placed on the event queue 240.

Referring now to FIG. 7, there is a flow chart of one method for configuring or reconfiguring a network device in accordance with the principles of the present invention. In this embodiment, the administrator 110 (shown in FIG. 2) initially logs in to the network manager unit 140 (Step 250). Through a series of a graphical interfaces (such as the global GUI in FIG. 8), the administrator 110 can select a network device that needs to be configured or reconfigured. The configuration record associated with the selected device can then be retrieved from the directory 165 (shown in FIG. 3) and presented to the administrator (Step 255). If no configuration record is available for a selected device, the administrator 110 will be guided through a series of steps to build the configuration for that device. Otherwise, the administrator 110 can change parameters within the configuration record of the selected device and save those altered configuration records within the directory 165 (Step 260). Notably, even though the configuration record for the selected network device has been changed, the actual configuration of the device has not been changed. Before the configuration of the device can be changed, an event message indicating that a configuration record has been altered should be published to the event bus 175 (shown in FIG. 3) (Step 265). The policy manager 170 (shown in FIG. 3) then receives the event message, either by reading it from the event bus 175 or by receiving it from the event bus 175, and determines if the configuration change is authorized (Step 270). If the configuration change is within the network rules and the administrator 110 (shown in FIG. 2) is authorized to make the change, a work order is published to the event bus (Step 280). The action manager 185 (shown in FIG. 3) can then read the work order from the event bus 175 and carry out the necessary steps to implement the work order (Step 280).

In one embodiment, the action manager 185 (shown in FIG. 3) carries out the work order by locating the target network device, retrieving the appropriate configuration record from the directory 165 (shown in FIG. 3), generating the device-specific code corresponding to the altered configuration (Step 290), and pushing the device-specific code to the target network device (Step 295). The action manger 185 can also store the device-specific code in a remote storage device, such as remote storage device 145 shown in FIG. 2, and a pointer to the remote storage device can be recorded in the configuration record. Finally, the action manager 185 can verify that the device-specific code was properly transferred to the selected network device and that the network device is behaving accordingly (Step 300). Assuming that the device-specific codes were installed correctly and that the network device is operating properly, a completion message is published to the event bus 175 (shown in FIG. 3) (Step 305).

Referring now to FIG. 8, there is illustrated a network system with an integrated global graphical user interface (GUI 310). In this embodiment, a global GUI 310 is disposed between the network administrator 110 and various network devices (collectively 315). These network devices include storage devices 320 a and 320 b, routers 325 a and 325 b, and DWDM (dense wave division multiplexing) switches 330 a and 330 b connected to optical servers 335 a and 335 b. Notably, the network devices of the same type can be manufactured by different manufacturers. For example, router 325 a can be manufactured by Cisco™ and router 325 b can be manufactured by Juniper™.

As previously discussed, in present network systems, a network administrator 110 could be required to navigate different communication interfaces for each of the network devices 315. Thus, for network system x, a network administrator 110 without the benefit of the present invention could be forced to learn six distinct interfaces. Through the present invention, however, the network administrator 110 can communicate with any of the network devices 315 by navigating the global GUI 310, which presents the network administrator 110 with a familiar graphical interface that has a similar look and feel for all network devices 315, regardless of device type or manufacturer.

Configuration and reconfiguration of a network device requires that certain attributes be provided to the network device. For different types and manufacturers of devices, these attributes and their formats can vary. DWDM switches, for example, require a wavelength attribute that routers do not. Moreover, one DWDM manufacturer may require the wavelength in a first format, and a second manufacturer may require the same information in a second format. Thus, the global GUI 310 can include both attributes and formatting instructions associated with each of the network devices 315. Good results have been achieved by arranging these attributes and/or formatting instructions in a directory tree 340 such as the one shown in FIG. 9. In this directory tree 340, the attributes and/or formatting instructions for a model A, Cisco™ router can be located by traversing the tree from the root to the router node to the Cisco™ node to the Model A leaf. The appropriate attributes and/or formatting instructions can be located from the Model A leaf.

To populate the attribute fields, the global GUI 310 could prompt the network administrator 110 for the necessary information. Once the global GUI 310 has acquired the necessary information, the information can be properly formatted—in accordance with the formatting instructions—and passed to the appropriate network device. In the presently preferred embodiment, the global GUI 310 formats the attribute data for a particular network device into a frame that includes a header portion and a payload portion. The header portion can include routing instructions in various formats including HTTP, and the payload portion can include the attribute data in various formats including XML. Additionally, the attribute data can be ordered within the payload according to the formatting instructions. When a network device receives a frame from the global GUI, it can extract the attribute data from the payload and use that data as if it had been received through the network device's own interface. Notably, the frame can be stored on virtually any computer media and/or can exist as an electronically altered signal—collectively referred to as a “computer program product.” (A “computer program product” refers to any media that may be used to provide programming instructions or data to an electronic system. A computer program product includes, but is not limited to, any memory device (whether fixed or removable), any storage medium, and/or any electronically altered signals that carry data.)

By using the present invention, a network administrator 110 need only learn to navigate the global GUI 310 and not the individual GUIs for the various network devices. Because the present invention allows network devices 315 to be configured and reconfigured without regard to their type or manufacturer, network administrators 110 will be able to add network devices to their network even when they are otherwise unfamiliar with the means for communicating with that type/brand of device. Additionally, the present invention will increase competition in the network device market because new device manufactures will be able to enter the market without first training network administrators to use their products. Moreover, the present invention will reduce network provider costs because fewer specialized administrators will be needed to communicate with the various types of devices.

Although the global GUI 310 can be operated independently of the network manager unit 140 (shown in FIG. 2), good results are expected when the two components are integrated. For example, the global GUI 310 could be used to alter the centrally stored configuration record for a network device. In fact, the templates used by the global GUI 310 can be associated with or even integrated with the configuration records stored in the directory 165 (shown in FIG. 3) of the network manager unit. For example, the data pointer 225 (shown in FIG. 5) could point to a corresponding template in the global GUI 310.

The information stored in a configuration record 205 can be used to populate the attribute fields for a network device's template. In other words, the network manager unit 140 (shown in FIG. 5) could retrieve the template for a particular network device, populate the attribute fields of that retrieved template with information from the device's configuration record, format the attribute fields into a frame and pass that frame to the network device. This frame, in some embodiments, constitutes the device-specific commands required to configure the network device.

In conclusion, the present system provides, among other things, a method and apparatus to configure, monitor and manage network devices without regard for device type and/or manufacturer. Those skilled in the art, however, can readily recognize that numerous variations and substitutions may be made in the invention, its use and its configuration to achieve substantially the same results as achieved by the embodiments described herein. Accordingly, there is no intention to limit the invention to the disclosed exemplary forms. Many variations, modifications and alternative constructions fall within the scope and spirit of the disclosed invention as expressed in the claims.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US499108930 Sep 19885 Feb 1991Ibm Corp.Method for establishing current terminal addresses for system users processing distributed application programs in an SNA LU 6.2 network environment
US51094866 Jan 198928 Apr 1992Motorola, Inc.Distributed computer system with network and resource status monitoring
US51596856 Dec 198927 Oct 1992Racal Data Communications Inc.Expert system for communications network
US544279112 May 199415 Aug 1995Aggregate Computing, Inc.Integrated remote execution system for a heterogenous computer network environment
US547581917 Jun 199412 Dec 1995Digital Equipment CorporationDistributed configuration profile for computing system
US549182010 Nov 199413 Feb 1996At&T CorporationDistributed, intermittently connected, object-oriented database and management system
US55069665 Nov 19929 Apr 1996Nec CorporationSystem for message traffic control utilizing prioritized message chaining for queueing control ensuring transmission/reception of high priority messages
US551970421 Apr 199421 May 1996Cisco Systems, Inc.Reliable transport protocol for internetwork routing
US55353355 May 19959 Jul 1996International Business Machines CorporationMethod and system for reporting the status of an aggregate resource residing in a network of interconnected real resources
US55577483 Feb 199517 Sep 1996Intel CorporationDynamic network configuration
US55817642 May 19943 Dec 1996Novadigm, Inc.Distributed computer network including hierarchical resource information structure and related method of distributing resources
US565974630 Dec 199419 Aug 1997Aegis Star CorporationMethod for storing and retrieving digital data transmissions
US568055131 Jan 199621 Oct 1997Sybase, Inc.Electronic messaging method of and system for heterogeneous connectivity and universal and generic interfacing for distributed applications and processes residing in wide variety of computing platforms and communication transport facilities
US572450922 Apr 19963 Mar 1998Motorola, Inc.Method and apparatus for synchronizing implementation of configuration information in a communication system
US572688310 Oct 199510 Mar 1998Xerox CorporationMethod of customizing control interfaces for devices on a network
US575196521 Mar 199612 May 1998Cabletron System, Inc.Network connection status monitor and display
US575196715 Jul 199612 May 1998Bay Networks Group, Inc.Method and apparatus for automatically configuring a network device to support a virtual network
US576495519 Oct 19959 Jun 1998Oasys Group, Inc.Gateway for using legacy telecommunications network element equipment with a common management information protocol
US578470227 Feb 199721 Jul 1998Internatinal Business Machines CorporationSystem and method for dynamically performing resource reconfiguration in a logically partitioned data processing system
US578724627 May 199428 Jul 1998Microsoft CorporationSystem for configuring devices for a computer system
US579673228 Mar 199618 Aug 1998Cisco Technology, Inc.Architecture for an expandable transaction-based switching bus
US58127686 Jun 199622 Sep 1998Software AgSystem for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol
US581902816 Apr 19976 Oct 1998Bay Networks, Inc.Method and apparatus for determining the health of a network
US581904220 Feb 19966 Oct 1998Compaq Computer CorporationMethod and apparatus for guided configuration of unconfigured network and internetwork devices
US5832503 *24 Feb 19953 Nov 1998Cabletron Systems, Inc.Method and apparatus for configuration management in communications networks
US583891831 Mar 199517 Nov 1998International Business Machines CorporationDistributing system configuration information from a manager machine to subscribed endpoint machines in a distrubuted computing environment
US584204018 Jun 199624 Nov 1998Storage Technology CorporationPolicy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units
US585274015 Oct 199722 Dec 1998Estes; Mark D.Polymorphic network methods and apparatus
US587292825 May 199516 Feb 1999Cabletron Systems, Inc.Method and apparatus for defining and enforcing policies for configuration management in communications networks
US587843229 Oct 19962 Mar 1999International Business Machines CorporationObject oriented framework mechanism for a source code repository
US588402829 Jul 199416 Mar 1999International Business Machines CorporationSystem for the management of multiple time-critical data streams
US588994329 Mar 199630 Mar 1999Trend Micro IncorporatedApparatus and method for electronic mail virus detection and elimination
US588995329 Mar 199630 Mar 1999Cabletron Systems, Inc.Policy management and conflict resolution in computer networks
US590132013 May 19974 May 1999Fujitsu LimitedCommunication system configured to enhance system reliability using special program version management
US592070128 Aug 19966 Jul 1999Starburst Communications CorporationScheduling data transmission
US592385028 Jun 199613 Jul 1999Sun Microsystems, Inc.Historical asset information data storage schema
US594478216 Oct 199631 Aug 1999Veritas Software CorporationEvent management system for distributed computing environment
US594806528 Mar 19977 Sep 1999International Business Machines CorporationSystem for managing processor resources in a multisystem environment in order to provide smooth real-time data streams while enabling other types of applications to be processed concurrently
US59563417 Aug 199721 Sep 1999International Business Machines CorporationMethod and system for optimizing data transmission line bandwidth occupation in a multipriority data traffic environment
US596159425 Feb 19975 Oct 1999International Business Machines CorporationRemote node maintenance and management method and system in communication networks using multiprotocol agents
US596812231 Mar 199719 Oct 1999Alcatel Alsthom Compagnie Generale D'electriciteMethod for propagating between views of connection object status in network
US596817629 May 199719 Oct 19993Com CorporationMultilayer firewall system
US597423617 Aug 199526 Oct 1999Aes CorporationDynamically reconfigurable communications network and method
US598007814 Feb 19979 Nov 1999Fisher-Rosemount Systems, Inc.Process control system including automatic sensing and automatic configuration of devices
US59999483 Sep 19977 Dec 19993Com CorporationDynamic configuration forms in network management software
US600603531 Dec 199721 Dec 1999Network AssociatesMethod and system for custom computer software installation
US601469718 Dec 199611 Jan 2000Cabletron Systems, Inc.Method and apparatus for automatically populating a network simulator tool
US601630624 Dec 199318 Jan 2000International Business Machines CorporationRouting bandwidth-reserved connections in information networks
US602358610 Feb 19988 Feb 2000Novell, Inc.Integrity verifying and correcting software
US602884611 Sep 199722 Feb 2000U S West, Inc.Method and system for testing real-time delivery of packets of data
US604134724 Oct 199721 Mar 2000Unified Access CommunicationsComputer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
US604982815 Sep 199811 Apr 2000Cabletron Systems, Inc.Method and apparatus for monitoring the status of non-pollable devices in a computer network
US605556817 Dec 199625 Apr 2000Intel CorporationMethod and apparatus for dynamically configuring a decentralized network of computers
US60852531 Aug 19974 Jul 2000United Video Properties, Inc.System and method for transmitting and receiving data
US608880412 Jan 199811 Jul 2000Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US609769717 Jul 19981 Aug 2000Sitara Networks, Inc.Congestion control
US609809427 Oct 19991 Aug 2000Mci Worldcom, IncMethod and system for an intelligent distributed network architecture
US609810111 Dec 19971 Aug 2000Micron Electronics, Inc.Method and apparatus for generating shared modem usage reports in a networked computer system
US609810830 Jan 19981 Aug 2000Sitara Networks, Inc.Distributed directory for enhanced network communication
US610150815 Apr 19988 Aug 2000Hewlett-Packard CompanyClustered file management for network resources
US61047003 Feb 199815 Aug 2000Extreme NetworksPolicy based quality of service
US610506913 Nov 199715 Aug 2000Novell, Inc.Licensing controller using network directory services
US610869927 Jun 199722 Aug 2000Sun Microsystems, Inc.System and method for modifying membership in a clustered distributed computer system and updating system configuration
US610870319 May 199922 Aug 2000Massachusetts Institute Of TechnologyGlobal hosting system
US612266427 Jun 199719 Sep 2000Bull S.A.Process for monitoring a plurality of object types of a plurality of nodes from a management node in a data processing system by distributing configured agents
US612872916 Dec 19973 Oct 2000Hewlett-Packard CompanyMethod and system for automatic configuration of network links to attached devices
US61311187 Jul 199810 Oct 2000Compaq Computer CorporationFlexible display of management data in a programmable event driven processing system
US61311191 Apr 199710 Oct 2000Sony CorporationAutomatic configuration system for mapping node addresses within a bus structure to their physical location
US615477620 Mar 199828 Nov 2000Sun Microsystems, Inc.Quality of service allocation on a network
US616744526 Oct 199826 Dec 2000Cisco Technology, Inc.Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US617000917 Jul 19982 Jan 2001Kallol MandalControlling devices on a network through policies
US617001112 Nov 19982 Jan 2001Genesys Telecommunications Laboratories, Inc.Method and apparatus for determining and initiating interaction directionality within a multimedia communication center
US61733129 Jul 19979 Jan 2001Hitachi, Ltd.System for reliably connecting a client computer to a server computer
US618209424 Jun 199830 Jan 2001Samsung Electronics Co., Ltd.Programming tool for home networks with an HTML page for a plurality of home devices
US619847924 Jun 19986 Mar 2001Samsung Electronics Co., LtdHome network, browser based, command and control
US620209011 Dec 199713 Mar 2001Cisco Technology, Inc.Apparatus and method for downloading core file in a network device
US621187720 Jul 19983 Apr 2001Hewlett-Packard CoMethod for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window
US622665427 May 19981 May 2001Sun Microsystems, Inc.Web document based graphical user interface
US624045822 Dec 199829 May 2001Unisys CorporationSystem and method for programmably controlling data transfer request rates between data sources and destinations in a data processing system
US624374712 Feb 19995 Jun 2001Cabletron Systems, Inc.Method and apparatus for defining and enforcing policies for configuration management in communications networks
US624381524 Dec 19975 Jun 2001Anand K. AnturMethod and apparatus for reconfiguring and managing firewalls and security devices
US624704915 Apr 199812 Jun 2001British Telecommunications Public Limited CompanyDesign of computer networks
US625324030 Oct 199826 Jun 2001International Business Machines CorporationMethod for producing a coherent view of storage network by a storage network manager using data storage device configuration obtained from data storage devices
US626007212 Jun 199710 Jul 2001Lucent Technologies IncMethod and apparatus for adaptive routing in packet networks
US626939822 Apr 199631 Jul 2001Nortel Networks LimitedMethod and system for monitoring remote routers in networks for available protocols and providing a graphical representation of information received from the routers
US62725267 Jan 19997 Aug 2001Iq Netsolutions, Inc.Distributed processing systems having self-advertising cells
US62860383 Aug 19984 Sep 2001Nortel Networks LimitedMethod and apparatus for remotely configuring a network device
US629288926 Nov 199718 Sep 2001Novadigm, Inc.Distributed computer network including hierarchical resource information structure and related method of distributing resources
US633814931 Jul 19988 Jan 2002Westinghouse Electric Company LlcChange monitoring system for a computer system
US634930630 Oct 199819 Feb 2002Aprisma Management Technologies, Inc.Method and apparatus for configuration management in communications networks
US635695521 Jul 200012 Mar 2002International Business Machines CorporationMethod of mapping GDMO templates and ASN.1 defined types into C++ classes using an object-oriented programming interface
US636341119 Oct 199926 Mar 2002Mci Worldcom, Inc.Intelligent network
US636342131 May 199826 Mar 2002Lucent Technologies, Inc.Method for computer internet remote management of a telecommunication network element
US63701196 Mar 19989 Apr 2002Cisco Technology, Inc.Computing the widest shortest path in high-speed networks
US637429315 Mar 199616 Apr 2002Aprisma Management Technologies, Inc.Network management system using model-based intelligence
US63816313 Jun 199930 Apr 2002Marimba, Inc.Method and apparatus for controlling client computer systems
US63934255 May 199921 May 2002Microsoft CorporationDiagramming real-world models based on the integration of a database, such as models of a computer network
US641846811 Jul 20019 Jul 2002Cisco Technology, Inc.Automatically verifying the feasibility of network management policies
US642695918 Feb 199930 Jul 2002Innovative Communications Technologies, Inc.System and method for facilitating component management in a multiple vendor satellite communications network
US643859431 Aug 199920 Aug 2002Accenture LlpDelivering service to a client via a locally addressable interface
US644260814 Jan 199927 Aug 2002Cisco Technology, Inc.Distributed database system with authoritative node
US644963830 Jun 199810 Sep 2002Microsoft CorporationChannel definition architecture extension
US644964613 Oct 199810 Sep 2002Aspect Communications CorporationMethod and apparatus for allocating mixed transaction type messages to resources via an integrated queuing mechanism
US645325517 Jan 200117 Sep 2002Unisys CorporationMethod for complex products configuration and guarantee generation
US6463470 *18 Aug 19998 Oct 2002Cisco Technology, Inc.Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US64635838 Apr 19998 Oct 2002Novadigm, Inc.Dynamic injection of execution logic into main dynamic link library function of the original kernel of a windowed operating system
US646658023 Feb 199915 Oct 2002Advanced Micro Devices, Inc.Method and apparatus for processing high and low priority frame data transmitted in a data communication system
US647045317 Sep 199822 Oct 2002Cisco Technology, Inc.Validating connections to a network system
US647377516 Feb 200029 Oct 2002Microsoft CorporationSystem and method for growing differential file on a base volume of a snapshot
US6487594 *30 Nov 199926 Nov 2002Mediaone Group, Inc.Policy management method and system for internet service providers
US649684331 Mar 199917 Dec 2002Verizon Laboratories Inc.Generic object for rapid integration of data changes
US64968585 Nov 199917 Dec 2002Tut Systems, Inc.Remote reconfiguration of a secure network interface
US6502131 *4 Dec 199831 Dec 2002Novell, Inc.Directory enabled policy management tool for intelligent traffic management
US65394257 Jul 199925 Mar 2003Avaya Technology Corp.Policy-enabled communications networks
US65464169 Dec 19988 Apr 2003Infoseek CorporationMethod and system for selectively blocking delivery of bulk electronic mail
US65500608 Apr 199915 Apr 2003Novadigm, Inc.Method and system for dynamic injection of dynamic link libraries into a windowed operating system
US65640563 Aug 199913 May 2003Avaya Technology Corp.Intelligent device controller
US656740610 Dec 199920 May 2003Tropic Networks Inc.Method of labeling data units with a domain field
US657128523 Dec 199927 May 2003Accenture LlpProviding an integrated service assurance environment for a network
US65981771 Oct 199922 Jul 2003Stmicroelectronics Ltd.Monitoring error conditions in an integrated circuit
US6609108 *4 Apr 200019 Aug 2003Ford Motor CompanyCommunication schema of online system and method of ordering consumer product having specific configurations
US661516627 May 19992 Sep 2003Accenture LlpPrioritizing components of a network framework required for implementation of technology
US661521817 Jul 19982 Sep 2003Sun Microsystems, Inc.Database for executing policies for controlling devices on a network
US662559010 Aug 199923 Sep 2003International Business Machines CorporationCommand line interface for reducing user input in a network management device
US66283049 Dec 199830 Sep 2003Cisco Technology, Inc.Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks
US663687721 Sep 199921 Oct 2003Verizon Laboratories Inc.Method for analyzing the quality of telecommunications switch command tables
US664328929 Dec 19994 Nov 20033Com CorporationMethod of MPOA status change notification
US66436407 Feb 20024 Nov 2003Verizon Laboratories Inc.Method for performing a data query
US6651191 *12 Sep 200018 Nov 2003Hewlett-Packard Development Company, L.P.Testing of policy prior to deployment in a policy-based network management system
US665479926 May 199925 Nov 2003Nec CorporationNetwork management system uses managed object instances which are hierarchically organized in inclusion relation for recursively creating processing object and recuresively returning information
US665852620 Oct 19992 Dec 2003Storage Technology CorporationNetwork attached virtual data storage subsystem
US667837021 Sep 199913 Jan 2004Verizon Laboratories Inc.Data extraction process
US66788276 May 199913 Jan 2004Watchguard Technologies, Inc.Managing multiple network security devices from a manager device
US668424129 Sep 199927 Jan 2004Nortel Networks LimitedApparatus and method of configuring a network device
US66842447 Jan 200027 Jan 2004Hewlett-Packard Development Company, Lp.Aggregated policy deployment and status propagation in network management systems
US669796712 Jun 200124 Feb 2004Yotta NetworksSoftware for executing automated tests by server based XML
US672523315 May 200120 Apr 2004Occam NetworksGeneric interface for system and application management
US672526227 Apr 200020 Apr 2004Microsoft CorporationMethods and systems for synchronizing multiple computing devices
US672526417 Feb 200020 Apr 2004Cisco Technology, Inc.Apparatus and method for redirection of network management messages in a cluster of network devices
US673217513 Apr 20004 May 2004Intel CorporationNetwork apparatus for switching based on content of application data
US673891028 Oct 199918 May 2004International Business Machines CorporationManual virtual private network internet snoop avoider
US676076127 Mar 20006 Jul 2004Genuity Inc.Systems and methods for standardizing network devices
US67607672 Dec 19996 Jul 2004General Electric CompanyCommunication connectivity verification and reporting system and method of use
US676636931 Jul 200020 Jul 2004Net Zero, Inc.Internet service error tracking
US676911631 May 200027 Jul 2004Oracle International CorporationDiagnostic technique for debugging memory corruption
US677220611 Jun 20013 Aug 2004Novell, Inc.XML-based integrated services bridging
US677569829 Dec 200010 Aug 2004Cisco Technology, Inc.Apparatus and method for downloading core file in a network device
US67824744 Jun 199924 Aug 2004Ssh Communication Security Ltd.Network connectable device and method for its installation and configuration
US68104274 Jun 199926 Oct 2004Nortel Networks LimitedRouter table manager
US681689730 Apr 20019 Nov 2004Opsware, Inc.Console mapping tool for automated deployment and management of network devices
US68265976 Dec 199930 Nov 2004Oracle International CorporationProviding clients with services that retrieve data from data sources that do not necessarily support the format required by the clients
US683224715 Jun 199814 Dec 2004Hewlett-Packard Development Company, L.P.Method and apparatus for automatic monitoring of simple network management protocol manageable devices
US683429821 Sep 199921 Dec 2004Siemens Information And Communication Networks, Inc.System and method for network auto-discovery and configuration
US684799425 Jul 200025 Jan 2005Panasonic Communications Co., Ltd.Error informing apparatus and error informing method
US686567321 Mar 20008 Mar 20053Com CorporationMethod for secure installation of device in packet based communication network
US689543129 Sep 200017 May 2005Interland, Inc.Providing user access to dynamic updating of remote configuration information
US68955889 Apr 199917 May 2005Sun Microsystems, Inc.Remote device access over a network
US690757210 Aug 200114 Jun 2005Occam NetworksCommand line interface abstraction engine
US693101613 Oct 199916 Aug 2005Nortel Networks LimitedVirtual private network management system
US693144424 May 200116 Aug 2005Amdocs (Israel) Ltd.System, method and computer program product for reading, correlating, processing, categorizing and aggregating events of any type
US693807919 Sep 200030 Aug 20053Com CorporationSystem and method for automatically configuring a client device
US695933212 Jul 200025 Oct 2005Cisco Technology, Inc.Basic command representation of quality of service policies
US6978301 *6 Mar 200120 Dec 2005IntellidenSystem and method for configuring a network device
US699059122 Dec 199924 Jan 2006Secureworks, Inc.Method and system for remotely configuring and monitoring a communication device
US70035603 Nov 200021 Feb 2006Accenture LlpData warehouse computing system
US70169552 Jul 200121 Mar 20063Com CorporationNetwork management apparatus and method for processing events associated with device reboot
US706594612 Nov 200427 Jun 2006Scag Power Equipment, Inc.Lawnmower having mulching cutter deck assembly
US7072934 *12 Jan 20014 Jul 2006Saba Software, Inc.Method and apparatus for a business applications server management system platform
US71275269 Nov 200024 Oct 2006Nortel Networks LimitedMethod and apparatus for dynamically loading and managing software services on a network device
US71458712 Mar 20025 Dec 2006At&T Corp.Automatic router configuration based on traffic and service level agreements
US720054829 Aug 20013 Apr 2007IntellidenSystem and method for modeling a network device's configuration
US724616231 Aug 200517 Jul 2007IntellidenSystem and method for configuring a network device
US724616331 Aug 200517 Jul 2007IntellidenSystem and method for configuring a network device
US72491706 Dec 200024 Jul 2007IntellidenSystem and method for configuration, management and monitoring of network resources
US7284042 *13 Aug 200216 Oct 2007Endforce, Inc.Device plug-in system for configuring network device over a public network
US2001003477112 Jan 200125 Oct 2001Sun Microsystems, Inc.Network portal system and methods
US200100539917 Mar 200120 Dec 2001Bonabeau Eric W.Methods and systems for generating business models
US2002000741131 Jan 200117 Jan 2002Shvat ShakedAutomatic network user identification
US2002003276927 Apr 200114 Mar 2002Sharon BarkaiNetwork management method and system
US2002003277528 Aug 200114 Mar 2002Ramesh VenkataramaiahSystem and method for transmitting and retrieving data via a distributed persistence framework
US2002003287115 May 200114 Mar 2002The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US2002003832029 Jun 200128 Mar 2002Brook John CharlesHash compact XML parser
US2002005108018 May 20012 May 2002Koichiro TanakaImage display apparatus, image display system, and image display method
US2002005271928 Sep 20012 May 2002Bruce AlexanderMethod and process for configuring a premises for monitoring
US200200691436 Dec 20006 Jun 2002Cepeda Jose AlbertoSystem and method for allocating operating expenses
US200200692716 Dec 20006 Jun 2002Glen TindalEvent manager for network operating system
US200200693406 Dec 20006 Jun 2002Glen TindalSystem and method for redirecting data generated by network devices
US200200693676 Dec 20006 Jun 2002Glen TindalNetwork operating system data directory
US200200729565 Oct 200113 Jun 2002Willems Sean P.System and method for determining the optimum configuration strategy for systems with multiple decision options
US200200780686 Sep 200120 Jun 2002Muralidhar KrishnaprasadMethod and apparatus for flexible storage and uniform manipulation of XML data in a relational database system
US2002007838215 May 200120 Jun 2002Ali SheikhScalable system for monitoring network system and components and methodology therefore
US2002014392726 Jan 20013 Oct 2002Maltz David A.Method and system for configuring a network element in a computer network
US2002016186330 Apr 200131 Oct 2002Mcguire JacobAutomated deployment and management of network devices
US2002016985811 May 200114 Nov 2002Doug BellingerBroadband network service delivery method and device
US200201717623 May 200221 Nov 2002Mitsubishi Digital Electronics America, Inc.Control system and user interface for network of input devices
US2002017399730 Mar 200121 Nov 2002Cody MenardSystem and method for business systems transactions and infrastructure management
US2002017409115 May 200121 Nov 2002Stan FroydGeneric interface for system and application management
US2002019161931 May 200119 Dec 2002Philip ShaferNetwork router management interface with API invoked via login stream
US2002019428918 Jun 200119 Dec 2002Engel Glenn R.Configuring devices using server responses
US2002019897431 May 200126 Dec 2002Philip ShaferNetwork router management interface with selective rendering of output
US2003001668513 Jul 200123 Jan 2003Arthur BerggreenMethod and apparatus for scheduling message processing
US2003001870230 Jan 200123 Jan 2003Justin BroughtonDigital multimedia contact center
US2003001876528 Jun 200123 Jan 2003Muhlestein Travis J.System and related methods for accessing management functionality through a command line utility
US2003003358930 Apr 200113 Feb 2003David ReynaSystem and method for utilization of a command structure representation
US2003003704013 Aug 200220 Feb 2003Smartpipes, IncorporatedSelection and storage of policies in network management
US2003004828710 Aug 200113 Mar 2003Little Mike J.Command line interface abstraction engine
US2003005100829 Aug 200113 Mar 2003Gorthy Scott B.System and method for generating a configuration schema
US2003006131226 Sep 200127 Mar 2003Bodner James T.Reduction of configuration time upon deployment of a configurable device in a shared resource environment
US200300659195 Apr 20023 Apr 2003Albert Roy DavidMethod and system for identifying a replay attack by an access device to a computer system
US2003008400930 Oct 20011 May 2003International Business Machines CorporationProduct support of computer-related products using intelligent agents
US2003013550815 Nov 200217 Jul 2003Dominic ChorafakisTranslating configuration files among network devices
US200301355475 Jul 200217 Jul 2003Kent J. ThomasExtensible modular communication executive with active message queue and intelligent message pre-validation
US2003015889416 May 200121 Aug 2003Francois ZisermanMultiterminal publishing system and corresponding method for using same
US2003018796431 Oct 20012 Oct 2003The University Court Of The University Of GlasgowMethod and system for updating data on an information appliance based on changes in local and remote data sources
US200302004593 Feb 200323 Oct 2003Seeman El-AzarMethod and system for protecting documents while maintaining their editability
US2004000149326 Jun 20021 Jan 2004Cloonan Thomas J.Method and apparatus for queuing data flows
US2004001559216 Apr 200322 Jan 2004Selgas Thomas DrennanModification of the hidden log-in-data
US2004002473624 Feb 20035 Feb 2004Akio SakamotoMethod and apparatus for monitoring a database system
US2004007869512 Feb 200322 Apr 2004Bowers Wayne J.Capturing system error messages
US2004022586518 Jun 200411 Nov 2004Cox Richard D.Integrated database indexing system
EP0384339A219 Feb 199029 Aug 1990Digital Equipment CorporationBroker for computer network server selection
EP745929A1 Title not available
EP0762281A312 Aug 199631 Mar 1999International Business Machines CorporationNetwork management with acquisition of formatted dump data from remote process
EP0810755A216 Jan 19973 Dec 1997Hewlett-Packard CompanyMethod for enhancing operation of a network management system
EP0952521A219 Apr 199927 Oct 1999Hewlett-Packard CompanyMethod for tracking configuration changes in networks of computer systems through historical monitoring of configuration status of devices on the network
EP0973296A29 Jul 199919 Jan 2000Sun Microsystems, Inc.Controlling devices on a network through policies
EP0993725A11 Jul 199819 Apr 2000Sitara Networks, Inc.Enhanced network communication
EP1011230A210 Dec 199921 Jun 2000Siemens Information and Communication Networks Inc.System and method for enhanced routing and reservation protocol
EP1012726A118 Jun 199728 Jun 2000Storage Technology CorporationPolicy caching method and apparatus for use in a communication device
EP1026867A217 Dec 19999 Aug 2000Northern Telecom LimitedSystem and method to support configurable policies of services in directory-based networks
EP1047226A221 Feb 200025 Oct 2000Hitachi, Ltd.Communication quality assurance type network system
EP1090492A121 Jun 199911 Apr 2001Jacobson Family Holdings, LLCNetwork policy management and effectiveness system
EP1091526A28 Mar 200011 Apr 2001Hitachi, Ltd.Network system
GB2368692A Title not available
JPH08139757A Title not available
WO1995024802A Title not available
WO1998018235A Title not available
WO2001001293A216 Jun 20004 Jan 2001Jacobs Rimell LimitedAutomated provisioning system
WO2001019031A118 Aug 200015 Mar 2001Intel CorporationExtensible policy-based network management architecture
WO2001047185A221 Dec 200028 Jun 2001Sitara Networks, IncorporatedIntegrated access point network device
WO2001047186A221 Dec 200028 Jun 2001Sitara Networks, IncorporatedBandwidth management system
WO2002047332A25 Dec 200113 Jun 2002Intelliden, Inc.System and method for configuration, management and monitoring of network resources
Non-Patent Citations
Reference
1"FFST/2 Generic Alert Router for LAN and SNA Transports." IBM Technical Disclosure Bulletin, IBM Corp. New York, US, vol. 34, No. 11, Apr. 1, 1992, pp. 467-468, XP000303331, ISSN: 0018-8689.
2Adminstrator's Guide, Formulator 3.0, 2000-2002, Gold Wire Technology Inc.
3Anderson, B.A. TACACS User Identification Telnet Option. RFC 927 [online], Dec. 1984 [retrieved on Mar. 25, 2002]. Retreived from the Internet .
4Anderson, B.A. TACACS User Identification Telnet Option. RFC 927 [online], Dec. 1984 [retrieved on Mar. 25, 2002]. Retreived from the Internet <.ietf.org/rfc/rfc0927.txt>.
5Anderson, B.A. TACACS User Identification Telnet Option. RFC 927 [online], Dec. 1984 [retrieved on Mar. 25, 2002]. Retrieved from the Internet.
6Anderson, B.A. TACACS User Identification Telnet Option. RFC 927 [online], Dec. 1984 [retrieved on Mar. 25, 2002]. Retrieved from the Internet<ieft.org/rfc/rfc0927.txt>.
7Case, J., A Simple Network Management Protocol (SNMP). RFC 1098 [online], Apr. 1989 [retrieved on Mar. 26, 2002]. Retrieved from the internet .
8Case, J., A Simple Network Management Protocol (SNMP). RFC 1098 [online], Apr. 1989 [retrieved on Mar. 26, 2002]. Retrieved from the internet <.ietf.org/rfc/rfc1098.txt?number=1098>.
9Case, J., A Simple Network Management Protocol (SNMP). RFC 1098 [online], Apr. 1989 [retrieved on Mar. 26, 2002]. Retrieved from the internet <ietf.org/rfc/rfc1098.txt?number=1098>.
10Common Information Model-A Developer's Perspecti ve, IEEE, 1998, p. 1.
11Common Information Model—A Developer's Perspecti ve, IEEE, 1998, p. 1.
12Finseth, C. An Access Control Protocol, Sometimes caleld TACACS. RFC 1492 [online], Jul. 1993 [retrieved on Mar. 25, 2002]. Retrieved from the Internet .cis.ohio-state.edu/cgi-bin/rfc/rfc1492.html>.
13Finseth, C. An Access Control Protocol, Sometimes called TACACS. RFC 1492 [online], Jul. 1993 [retrieved on Mar. 25, 2002]. Retrieved from the Internet .
14Finseth, C. An Access Control Protocol, Sometimes called TACACS. RFC 1492 [online], Jul. 1993 [retrieved on Mar. 25, 2002]. Retrieved from the Internet <cis.ohio-state.edu/egi/bin/rfc/rfc1492.html>.
15Gold Wire Technology, "Tracking Changes." In Formulator 1.0 User Guide, pp. 211-224.
16HP OpenView for Windows Workgroup Node Manager User Guide, 3COM, Jan. 1997, Part No. 09-1114-000, Hewlett-Packard Co., Santa Clara, CA USA.
17Initially Configuring the ATM Switch Router, Cisco, Oct. 19, 2000, pp. 1-42.
18ISM Customer- Aware (TM) Provisioning: CoManage Corporation; as of Dec. 5, 2000 (2 pages).
19ISM Customer- Aware (TM) Query; CoManage Corporation; as of Dec. 5, 2000 (2 pages).
20ISM Customer- Aware (TM) Service Profling; CoManage Corporation: as of Dec. 5, 2000 (2 pages).
21ISM Customer- Aware ™ Provisioning: CoManage Corporation; as of Dec. 5, 2000 (2 pages).
22ISM Customer- Aware ™ Query; CoManage Corporation; as of Dec. 5, 2000 (2 pages).
23ISM Customer- Aware ™ Service Profling; CoManage Corporation: as of Dec. 5, 2000 (2 pages).
24ISM Customer- Aware(TM) Deep Discovery(TM); CoManage Corporation, as of Dec. 5, 2000 (2 pages).
25ISM Customer- Aware(TM) Fault and Performance Management; CoManage Corporation: as of Dec. 5, 2000 (2 pages).
26ISM Customer- Aware™ Deep Discovery™; CoManage Corporation, as of Dec. 5, 2000 (2 pages).
27ISM Customer- Aware™ Fault and Performance Management; CoManage Corporation: as of Dec. 5, 2000 (2 pages).
28ISM Customer-Aware(TM) Deep Discovery(TM); CoManage Corporation; As of Dec. 5, 2000 (2 pages).
29ISM Customer-Aware(TM) Fault and Performance Management; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
30ISM Customer-Aware(TM) Provisioning; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
31ISM Customer-Aware(TM) Query; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
32ISM Customer-Aware(TM) Service Profiling; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
33ISM Customer—Aware™ Deep Discovery™; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
34ISM Customer—Aware™ Fault and Performance Management; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
35ISM Customer—Aware™ Provisioning; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
36ISM Customer—Aware™ Query; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
37ISM Customer—Aware™ Service Profiling; CoManage Corporation; As of Dec. 5, 2000 (2 pages).
38Kennedy T W: "Network Operations & Management Tool Requirements for the 90s" Proceedings of the Network Operations and Management Symposium (NOMS). Memphis, Apr. 6-9, 1992, New York, IEEE, U.S. Vo. 1, 1992, pp. 122-132.
39Lee, W.C. et al: "Routing Subject to Quality of Service Constraints in Integrated Commamication Networks" IEEE Network, IEEE Inc. New York, US, vol. 9, No. 4, Jul. 1, 1995 (Jul. 1, 1995), pp. 46-55, XP000525591, ISSN: 0890-8044 the whole document.
40Lewis, L., "Policy-Based Configuration Management: A Perspective from a Network Management Vendor," simple-times.org./pub/simple-times/issues/8-1.html., pp. 7-27.
41Lewis, L., "Policy-Based Configuration Management: A Perspective from a Network Management Vendor," .simple-times.org./pub/simple-times/issues/8-1.html., pp. 7-27.
42Lewis, L., "Policy-Based Configuration Management: A Perspective from a Network Management Vendor," simple-times.org./pub/simple-times/issues/8-1.html., pp. 7-27.
43Liu, Stephen, Cisco IOS Command Line Interface Tutorial, 1997, Small/Medium Business Solutions, .com/warp/cpropub/45/tutorial.htm.
44Lonvick, C. The BSD syslog Protocol. RFC 3164 [online], Aug. 2001 (retrieved on Mar. 25, 2002). Retrieved from the Internet, .
45Lonvick, C. The BSD syslog Protocol. RFC 3164 [online], Aug. 2001 (retrieved on Mar. 25, 2002). Retrieved from the Internet, <ietf.org/rfc/rfc3164.txt>.
46Lonvick, C. The BSD syslog Protocol. RFC 3164 [online], Aug. 2001 [retrieved on Mar. 25, 2002]. Retrieved from the Internet, ://www.ietf.org/rfc/rfc3164.txt>.
47Managing Managed Network Services: The Service Provider Blind Spot; Infonetics Research, The Networking Information Source: Jun. 2000 (18 pages).
48Managing Managed Network Services: The Service Provider Blink Spot: Infonetics Research, The Networking Information Source; Jun. 2000 (18 pages).
49NOMS, IEEE 1992 Network Operations and Management Symposium, 1992, vol. 1, IEEE Communications Society, NewYork, USA.
50PCT/US 01/45668-International Search Report dated Oct. 16, 2002.
51PCT/US 01/45668—International Search Report dated Oct. 16, 2002.
52PCT/US 01/45669-International Search Report dated Oct. 16, 2002.
53PCT/US 01/45669—International Search Report dated Oct. 16, 2002.
54PCT/US 01/45670-International Search Report dated Dec. 20, 2002.
55PCT/US 01/45670—International Search Report dated Dec. 20, 2002.
56PCT/US 01/45671-International Search Report dated Oct. 16. 2002.
57PCT/US 01/45671—International Search Report dated Oct. 16. 2002.
58PCT/US 01/45671-Written Opinion dated Dec. 13, 2002.
59PCT/US 01/45671—Written Opinion dated Dec. 13, 2002.
60PCT/US 01/45672-International Search Report dated Apr. 14, 2003.
61PCT/US 01/45672—International Search Report dated Apr. 14, 2003.
62Postel, J., and Reynolds, J. Telnet Protocol Specification. RFC 854 [online], May 1983 [retrieved on Mar. 25, 2002]. Retrieved from the Internet .
63Postel, J., and Reynolds, J. Telnet Protocol Specification. RFC 854 [online], May 1983 [retrieved on Mar. 25, 2002]. Retrieved from the Internet <.ietf.org/rfc/rfc0854.txt>.
64Postel, J., and Reynolds, J. Telnet Protocol Specification. RFC 854 [online], May 1983 [retrieved on Mar. 25, 2002]. Retrieved from the Internet <ietf.org/rfc/rfc0854.txt>.
65Postel, J.B. Simple Mail Transfer Protocol, RFC 821 [online], Aug. 1982 [retrieved on Mar. 26, 2002]. Retrieved from the Internet .
66Postel, J.B. Simple Mail Transfer Protocol, RFC 821 [online], Aug. 1982 [retrieved on Mar. 26, 2002]. Retrieved from the Internet <ietf.org/rfc/rfc0821.xtx?number<821>.
67Postel, J.B. Simple Mail Transfer Protocol. RFC 821 [online], Aug. 1982 [retrieved on Mar. 26, 2002]. Retrieved from the Internet .ietf.org/rfc/rfc0821.txt?number=821>.
68Rigney, C., et al. Remote Authentication Dial In User Service (RADIUS). RFC 2138 [online], Apr. 1997 {retrieved on Mar. 25, 2002]. Retrieved from the Internet .
69Rigney, C., et al. Remote Authentication Dial In User Service (RADIUS). RFC 2138 [online], Apr. 1997 {retrieved on Mar. 25, 2002]. Retrieved from the Internet <.ietf.org/rfc/rfc2138.txt>.
70Rigney, C., et al. Remote Authentication Dial in User Service (RADIUS). RFC 2138 [online], Apr. 1997 {retrieved on Mar. 25, 2002}. Retrieved from the Internet .
71Rigney, C., et al. Remote Authentication Dial in User Service (RADIUS). RFC 2138 [online], Apr. 1997 {retrieved on Mar. 25, 2002}. Retrieved from the Internet <ietf.org/rfc/rfc2138.txl>.
72Rigney, C., RADIUS Accounting. RFC 2139 [online], Apr. 1997 [retrieved on Mar. 25, 2002]. Retrieved from the Internet .
73Rigney, C., RADIUS Accounting. RFC 2139 [online], Apr. 1997 [retrieved on Mar. 25, 2002]. Retrieved from the Internet <.ietf.org/rfc/rfc2139.txt>.
74Rigney, C., RADIUS Accounting. RFC 2139 [online], Apr. 1997 [retrieved on Mar. 25, 2002]. Retrieved from the Internet <ietf.org/rfc/rfc2139.txt>.
75Strassner, J., A New Paradigm for Network Management: Business Deriven Device Management, [online], 2002, .ssgrr.it/en/ssgrr2002s/papers.htm, http://www.ssgrr.it/en/ssgrr2002s/papers/162.pdf.
76Strassner, J., A New Paradigm for Network Management: Business Deriven Device Management,[online], 2002, ssgrr.it/en/ssgrr2002s/papers.htm, http://www.ssgrr.it/en/ssgrr2002s/papers/t62/pdf.
77Strassner, John; Technology Series-Directory Enabled Networks, 1999; MacMillan Technical Publishing USA.
78Strassner, John; Technology Series—Directory Enabled Networks, 1999; MacMillan Technical Publishing USA.
79Superstack II Hub TR Network Management Module Installation Guide, 3COM Jan 1997, Hewlett-Packard Co., Santa Clara, CA USA.
80Torrent S et al: "Implementation of the ANSI T1M1.5 GBM-T1.214 within an ODBMS framework" Networking: Foundation for the Future, San Francisco, Mar. 28—Apr. 1, 1993, Proceedings of the Annual Joint Conference of the Computer and Communications Societies (INFOCOM), Los Alamitos, IEE Comp. Soc. Press, US, vol. 2 CONF. 12, Mar. 28, 1993, pp. 875-884, XP010032227, ISBN: 0-8186-3580-0.
81Torrent S et al: "Implementation of the ANSI T1M1.5 GBM-T1.214 within an ODBMS framework" Networking: Foundation for the Future, San Francisco, Mar. 28-Apr. 1, 1993, Proceedings of the Annual Joint Conference of the Computer and Communications Societies (INFOCOM), Los Alamitos, IEE Comp. Soc. Press, US, vol. 2 CONF. 12, Mar. 28, 1993, pp. 875-884, XP010032227, ISBN: 0-8186-3580-0.
82User Guide Formulator 1.0, 2000-2001, Gold Wire Technology Inc.
83Waldbusser, ST., et al., "Policy Based Management MIB," .ietf.org/internet-drafts/draft-ietf-snmpconf-pm-05.txt, pp. 1-102.
84Waldbusser, ST., et al., "Policy Based Management MIB," ietf.org/internet/drafts/draft-ietf/snmpconf-pm-05.txt, pp. 1-102.
85Williams R: "Web Based Enterprise Management W101" DMTF 1999 Annual Conference, Online! Jun. 15-16, 1999, pp. 1-21.
86Wolfson, Ouri et al.: "Managing Communication Networks by Monitoring Databases", IEEE Transactions on Software Engineering, IEEE Inc. New York, US, vol. 17, No. 9 Sep. 1, 1991, pp. 944-953.
87Yeong et al., Lightweight Directory Access Protocol, RFC 1487, Jul. 1993.
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US8010650 *2 Jun 200930 Aug 2011International Business Machines CorporationManaging a computer network
US804178613 Jun 200718 Oct 2011International Business Machines CorporationConfiguration, management and monitoring of network resources using device specific command templates
US8108495 *30 Apr 200931 Jan 2012Palo Alto Networks, Inc.Managing network devices
US819582721 Jul 20115 Jun 2012International Business Machines CorporationObtaining information from different devices in a computer network
US843283230 Aug 201230 Apr 2013Palo Alto Networks, Inc.Managing network devices
US8438252 *22 Dec 20117 May 2013Palo Alto Networks, Inc.Managing network devices
US87693425 Jul 20121 Jul 2014International Business Machines CorporationRedirecting data generated by network devices
US8819201 *7 Aug 200826 Aug 2014At&T Intellectual Property I, L.P.Method and apparatus for providing routing and access control filters
US941789228 Sep 201216 Aug 2016International Business Machines CorporationConfiguration command template creation assistant using cross-model analysis to identify common syntax and semantics
US9491047 *5 Feb 20138 Nov 2016Palo Alto Networks, Inc.Managing network devices
US959625330 Oct 201414 Mar 2017Splunk Inc.Capture triggers for capturing network data
US968070331 Jul 201513 Jun 2017International Business Machines CorporationConfiguration command template creation assistant using cross-model analysis to identify common syntax and semantics
US976243921 Jun 201612 Sep 2017International Business Machines CorporationConfiguration command template creation assistant using cross-model analysis to identify common syntax and semantics
US976244315 Apr 201412 Sep 2017Splunk Inc.Transformation of network data at remote capture agents
US20070233826 *13 Jun 20074 Oct 2007Tindal Glen DSystem and method for configuration, management and monitoring of network resources
US20100037287 *7 Aug 200811 Feb 2010Mallikarjun NetrakantiMethod and apparatus for providing routing and access control filters
US20100146095 *2 Jun 200910 Jun 2010John StrassnerSystem and method for mapping between and controlling different device abstractions
US20120166599 *22 Dec 201128 Jun 2012Palo Alto Networks, Inc.Managing network devices
US20130198348 *5 Feb 20131 Aug 2013Palo Alto Networks, Inc.Managing network devices
US20160127180 *30 Oct 20145 May 2016Splunk Inc.Streamlining configuration of protocol-based network data capture by remote capture agents
Classifications
U.S. Classification709/220, 709/238, 709/223, 709/201
International ClassificationH04L12/24, G06F15/173, G06F15/177
Cooperative ClassificationH04L41/0869, H04L41/0803, H04L41/0273, H04L41/0843, H04L41/0893, H04L41/22, H04L41/0863, H04L41/0866, H04L41/0226, H04L41/0859, H04L41/0879, H04L41/0853, H04L41/0266, H04L43/0817, H04L41/06
European ClassificationH04L41/08A, H04L41/22, H04L41/08F, H04L41/08A4A, H04L41/02G4, H04L41/02D, H04L41/02G3, H04L41/08D1, H04L43/08D
Legal Events
DateCodeEventDescription
19 Feb 2009ASAssignment
Owner name: CONTINUUM NETWORKS, INC., COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TINDAL, GLEN D.;REEL/FRAME:022285/0408
Effective date: 20010209
20 Feb 2009ASAssignment
Owner name: INTELLIDEN, INC., COLORADO
Free format text: CHANGE OF NAME;ASSIGNOR:CONTINUUM NETWORKS, INC.;REEL/FRAME:022289/0405
Effective date: 20010424
17 Apr 2009ASAssignment
Owner name: MATRIX VI PARALLEL PARTNERSHIP-B, L.P., MASSACHUSE
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: MATRIX PARTNERS VI, L.P., MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: WESTON & CO. VI, LLC, MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: WESTBURY EQUITY PARTNERS SBIC, L.P., NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: KOOKABURRA LLC, NEW YORK
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: GRANITE GLOBAL VENTURES II L.P., CALIFORNIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: GGV II ENTREPRENEURES FUND L.P., CALIFORNIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: LALUDE, AKINYEMI O., TEXAS
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: SNOWS HILL, LLC, MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: SUE GERDELMAN & JOHN GERDELMAN TTEE REVOC. TRUST O
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: GERDELMAN, SUE & JOHN, VIRGINIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: VOS, REMKO, CALIFORNIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: BOYNTON FAMILY TRUST BY CHARLES BOYNTON, CALIFORNI
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: MATRIX VI PARALLEL PARTNERSHIP-A, L.P., MASSACHUSE
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: BLACK FAMILY TRUST 2001 U/I DTD, CALIFORNIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: SCHNEIDER, JAMES M., TEXAS
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: GAFFNEY, ROBERT P., COLORADO
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
Owner name: MICHAEL J. ROWNY REVOCABLE TRUST UTA, MARYLAND
Free format text: SECURITY AGREEMENT;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:022552/0785
Effective date: 20090319
9 Mar 2010ASAssignment
Owner name: INTELLIDEN, INC.,COLORADO
Free format text: RELEASE BY SECURED PARTY;ASSIGNORS:MATRIX PARTNERS VI, L.P.;MATRIX VI PARALLEL PARTNERSHIP-B, L.P.;WESTON & CO. VI, LLC;AND OTHERS;REEL/FRAME:024053/0635
Effective date: 20100215
Owner name: INTELLIDEN, INC., COLORADO
Free format text: RELEASE BY SECURED PARTY;ASSIGNORS:MATRIX PARTNERS VI, L.P.;MATRIX VI PARALLEL PARTNERSHIP-B, L.P.;WESTON & CO. VI, LLC;AND OTHERS;REEL/FRAME:024053/0635
Effective date: 20100215
30 Aug 2010ASAssignment
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLIDEN, INC.;REEL/FRAME:024906/0572
Effective date: 20100727
30 Aug 2013REMIMaintenance fee reminder mailed
26 Dec 2013FPAYFee payment
Year of fee payment: 4
26 Dec 2013SULPSurcharge for late payment
18 Jul 2017FPAYFee payment
Year of fee payment: 8